城市(city): unknown
省份(region): unknown
国家(country): Japan
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 219.97.50.85
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8487
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;219.97.50.85. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022500 1800 900 604800 86400
;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 26 01:35:25 CST 2025
;; MSG SIZE rcvd: 105
85.50.97.219.in-addr.arpa domain name pointer ntchba674085.chba.nt.ngn.ppp.infoweb.ne.jp.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
85.50.97.219.in-addr.arpa name = ntchba674085.chba.nt.ngn.ppp.infoweb.ne.jp.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 197.0.22.21 | attack | Port Scan: TCP/5555 |
2019-09-14 13:58:45 |
| 117.34.118.127 | attackbots | Port Scan: TCP/445 |
2019-09-14 14:08:26 |
| 18.219.132.145 | attackbots | Port Scan: TCP/443 |
2019-09-14 13:23:49 |
| 98.122.182.153 | attackspam | Port Scan: UDP/137 |
2019-09-14 13:10:17 |
| 177.221.76.156 | attack | Port Scan: TCP/23 |
2019-09-14 14:02:24 |
| 50.62.133.239 | attackbots | Port Scan: TCP/445 |
2019-09-14 13:19:56 |
| 162.244.65.49 | attack | Port Scan: TCP/445 |
2019-09-14 14:03:58 |
| 206.253.38.78 | attackbots | Port Scan: UDP/137 |
2019-09-14 13:29:19 |
| 120.52.152.15 | attackbotsspam | 14.09.2019 05:55:30 Connection to port 19 blocked by firewall |
2019-09-14 14:06:24 |
| 115.59.131.190 | attackbots | Seq 2995002506 |
2019-09-14 14:08:57 |
| 111.185.48.247 | attackspam | Port Scan: TCP/81 |
2019-09-14 14:10:48 |
| 92.244.36.82 | attackspambots | Port Scan: TCP/23 |
2019-09-14 13:12:21 |
| 72.73.102.35 | attackspambots | Port Scan: TCP/135 |
2019-09-14 13:14:40 |
| 109.111.190.65 | attack | Port Scan: TCP/445 |
2019-09-14 13:43:21 |
| 111.250.141.192 | attack | Honeypot attack, port: 23, PTR: 111-250-141-192.dynamic-ip.hinet.net. |
2019-09-14 14:10:09 |